Paper 2010/447

Side-channel Analysis of Six SHA-3 Candidates

Olivier Benoit and Thomas Peyrin

Abstract

In this paper we study six 2nd round SHA-3 candidates from a side-channel cryptanalysis point of view. For each of them, we give the exact procedure and appropriate choice of selection functions to perform the attack. Depending on their inherent structure and the internal primitives used (Sbox, addition or XOR), some schemes are more prone to side channel analysis than others, as shown by our simulations.

Metadata
Available format(s)
PDF
Category
Secret-key cryptography
Publication info
Published elsewhere. published at CHES 2010
Keywords
side-channelhash functioncryptanalysisHMACSHA-3
Contact author(s)
thomas peyrin @ gmail com
History
2010-08-20: revised
2010-08-18: received
See all versions
Short URL
https://ia.cr/2010/447
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2010/447,
      author = {Olivier Benoit and Thomas Peyrin},
      title = {Side-channel Analysis of Six SHA-3 Candidates},
      howpublished = {Cryptology ePrint Archive, Paper 2010/447},
      year = {2010},
      note = {\url{https://eprint.iacr.org/2010/447}},
      url = {https://eprint.iacr.org/2010/447}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.